In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/107160 | vdb entry broken link |
https://security.gentoo.org/glsa/202006-04 | third party advisory vendor advisory |
https://usn.ubuntu.com/4416-1/ | third party advisory vendor advisory |
https://kc.mcafee.com/corporate/index?page=content&id=SB10278 | third party advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | not applicable |
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9 | |
https://security.netapp.com/advisory/ntap-20190315-0002/ | third party advisory patch |
https://sourceware.org/bugzilla/show_bug.cgi?id=24114 | patch third party advisory issue tracking |
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 | vendor advisory mailing list exploit |
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 | vendor advisory mailing list exploit |
https://support.f5.com/csp/article/K54823184 | third party advisory |